Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.
References
Link | Resource |
---|---|
http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html | Patch Vendor Advisory |
http://www.cs.tau.ac.il/~tromer/handsoff/ | Technical Description |
http://openwall.com/lists/oss-security/2014/08/16/2 | Mailing List Third Party Advisory |
http://www.debian.org/security/2014/dsa-3073 | Third Party Advisory |
http://www.debian.org/security/2014/dsa-3024 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2014-10-09 18:55
Updated : 2017-11-03 18:29
NVD link : CVE-2014-5270
Mitre link : CVE-2014-5270
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
debian
- debian_linux
gnupg
- libgcrypt